1. ASN.1 communication between heterogeneous systems

by Dubuisson, Olivier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Diego: Morgan Kaufmann, 2001Availability: Items available for loan: [Call number: 004.35 DUB] (1).
2. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
3. Elements of network protocol design

by Gouda, Mohame G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: John Wiley & Sons, 1998Availability: Items available for loan: [Call number: 004.62 GOU] (1).
4. High-performance data network design: Design techniques and tools

by Kenyon, Tony.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Digital Press, 2002Availability: Items available for loan: [Call number: 004.6 KEN] (1).
5. MPLS : technology and applications

by Davie, Bruce S | Rekhter, Yakov.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: San Francisco: Morgan Kaufmann, 2000Availability: Items available for loan: [Call number: 004.66 DAV] (1).
6. Network and parallel computing : IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, proceedings

by Hai, Jin | Chen, Hao | Gao, Guang R | Xu, Zhiwei.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2004Availability: Items available for loan: [Call number: 004 JIN] (1).
7. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
8. Data communication and computer networks

by Instructional Software Research and Development Group, Lucknow.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2007Availability: Items available for loan: [Call number: 004.6 INS] (1).
9. Cisco Router OSPF

by Parkhurst, William R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 004.62 PAR] (1).
10. SSL and TLS : designing and building secure systems

by Rescorla, Eric.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Addison-Wesley, 2000Availability: Items available for loan: [Call number: 005.8 RES] (1).
11. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
12. Protocol : how control exists after decentralization

by Galloway, Alexander R.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: MIT Press, 2004Availability: Items available for loan: [Call number: 005.8 GAL] (1).
13. Secure key establishment

by Choo, Kim-Kwang Raymond.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2009Availability: Items available for loan: [Call number: 005.82 CHO] (1).
14. High performance switches and routers

by Chao, H. Jonathan | Liu, Bin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hoboken: John Wiley & Sons, 2007Availability: Items available for loan: [Call number: 621.38216 CHA] (1).
15. Communication protocol engineering

by Popovic, Miroslav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press/Taylor & Francis, 2006Availability: Items available for loan: [Call number: 621.38212 POP] (1).
16. Broadband access technology, interfaces, and management

by Gillespie, Alex.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2001Availability: Items available for loan: [Call number: 621.3821 GIL] (1).
17. 802.1X port-based authentification

by Brown, Edwin Lyle.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2007Availability: Items available for loan: [Call number: 005.8 BRO] (1).
18. Introduction to network security

by Krawetz, Neal.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Charles River Media, 2006Availability: Items available for loan: [Call number: 005.8 KRA] (2).
19. Delay-and Disruption-Tolerant Networking

by Farrell, Stephen | Cahill, Vinny.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2006Availability: Items available for loan: [Call number: 004.6 FAR] (1).
20. SSL and TLS : theory and practice

by Oppliger, Rolf.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2009Availability: Items available for loan: [Call number: 005.8 OPP] (1).

Powered by Koha